6 C
London
Tuesday, November 21, 2017
Home Tags Hash

Tag: Hash

Pick your language and take on programming challenges for fun and coder cred.
A vulnerability in the Advanced Malware Protection (AMP) file filtering feature of Cisco AsyncOS Software for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to bypass a configured AMP file filtering rule.

The fil...
Pilot program goals are laudable, but is the remedy as bad as the ailment it treats?
Gaza cybergang is an Arabic politically motivated cyber criminal group, operating since 2012 and is actively targeting the MENA (Middle East North Africa) region.

Gaza cybergang attacks have never slowed down, recent targets by the group does seem to be varied in nature, attackers do not seem to be selectively choosing targets, but rather seeking different kinds of MENA intelligence.
In May 2017, Kaspersky Lab researchers discovered a forum post advertising ATM malware that was targeting specific vendor ATMs.

The forum contained a short description of a crimeware kit designed to empty ATMs with the help of a vendor specific API, without interacting with ATM users and their data.

The price of the kit was 5000 USD at the time of research.
New laws will have to be written based on the level of automation you have.

Miners on the Rise

Over the last month alone, we have detected several large botnets designed to profit from concealed crypto mining. We have also observed growing numbers of attempts to install miners on servers owned by organizations. When these attempts are successful, the companiesrsquo; business processes suffer because data processing speeds fall substantially.
Defendant to ask Supreme Court if compelled decryption is a 5th Amendment breach.
Locking down servers and cloud with this itty-bitty chip Google has unveiled more details about how security built into its custom silicon chips underpins the integrity of its servers and cloud-based services.…

No Free Pass for ExPetr

Recently, there have been discussions around the topic that if our product is installed, ExPetr malware wonrsquo;t write the special malicious code which encrypts the MFT to MBR.
Some have even speculated that some kind of conspiracy might be ongoing.… Read Full Article

Schroedinger’s Pet(ya)

Earlier today (June 27th), we received reports about a new wave of ransomware attacks spreading around the world, primarily targeting businesses in Ukraine, Russia and Western Europe. Our investigation is ongoing and our findings are far from final at this time.

Despite rampant public speculation, the following is what we can confirm from our independent analysis.
Acronis True Image fails to securely check for and retrieve updates,which an allow an authenticated attacker to execute arbitrary code with administrator privileges.